The install/install.php
endpoint insecurely stores user input into the database as url_base
and url_base_api
. These settings are referenced throughout the application and allow for vulnerabilities like Cross-Site Scripting and Insecure Redirection
Impact
Since authentication is not required to perform these changes,anyone could point these fields at malicious websites or form input in a way to trigger XSS. Leveraging JavaScript it’s possible to steal cookies, perform actions as the user, etc...
For more information
If you have any questions or comments about this advisory:
Email us at [email protected]
The
install/install.php
endpoint insecurely stores user input into the database asurl_base
andurl_base_api
. These settings are referenced throughout the application and allow for vulnerabilities like Cross-Site Scripting and Insecure RedirectionImpact
Since authentication is not required to perform these changes,anyone could point these fields at malicious websites or form input in a way to trigger XSS. Leveraging JavaScript it’s possible to steal cookies, perform actions as the user, etc...
For more information
If you have any questions or comments about this advisory:
Email us at [email protected]